(2014). Authentication in insecure environments: Using visual cryptography and non-transferable credentials in practise.
Chicago Style CitationAuthentication in Insecure Environments: Using Visual Cryptography and Non-transferable Credentials in Practise. 2014.
MLA CitationAuthentication in Insecure Environments: Using Visual Cryptography and Non-transferable Credentials in Practise. 2014.
Warning: These citations may not always be 100% accurate.